CVE-2022-22514
📋 TL;DR
CVE-2022-22514 is a memory corruption vulnerability in CODESYS Control runtime systems that allows authenticated remote attackers to cause denial of service through system crashes. Attackers can dereference pointers in requests leading to invalid memory access, but cannot read memory contents or control written values. This affects industrial control systems using vulnerable CODESYS software.
💻 Affected Systems
- CODESYS Control runtime systems
📦 What is this software?
Control For Wago Touch Panels 600 Sl by Codesys
View all CVEs affecting Control For Wago Touch Panels 600 Sl →
Control Rte Sl \(for Beckhoff Cx\) by Codesys
View all CVEs affecting Control Rte Sl \(for Beckhoff Cx\) →
Gateway by Codesys
Hmi Sl by Codesys
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash leading to denial of service in industrial control environments, potentially disrupting critical operations.
Likely Case
Service disruption through application crashes requiring manual restart of affected CODESYS runtime systems.
If Mitigated
Minimal impact with proper network segmentation and authentication controls limiting attack surface.
🎯 Exploit Status
Requires authenticated access and specific knowledge of the system. No public exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V3.5.18.0 and later
Vendor Advisory: https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17093&token=15cd8424832ea10dcd4873a409a09a539ee381ca&download=
Restart Required: Yes
Instructions:
1. Download CODESYS Control V3.5.18.0 or later from CODESYS customer portal. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Restart affected systems.
🔧 Temporary Workarounds
Disable CmpTraceMgr component
allRemove or disable the vulnerable CmpTraceMgr component if not required for operations.
Refer to CODESYS documentation for component management commands
Network segmentation
allRestrict network access to CODESYS systems to only trusted sources.
firewall rules to limit access to CODESYS ports (typically 1217, 1740-1750)
🧯 If You Can't Patch
- Implement strict authentication controls and limit user access to minimum required privileges
- Monitor systems for crash events and implement redundancy for critical operations
🔍 How to Verify
Check if Vulnerable:
Check CODESYS Control version via CODESYS IDE or system information tools. Versions below V3.5.18.0 are vulnerable.
Check Version:
Check via CODESYS IDE: Project → Device → Device Information or system-specific version commands
Verify Fix Applied:
Verify installed version is V3.5.18.0 or later using CODESYS version check commands or IDE.
📡 Detection & Monitoring
Log Indicators:
- Unexpected application crashes
- Memory access violation errors in system logs
- CmpTraceMgr component failures
Network Indicators:
- Unusual authentication attempts to CODESYS services
- Traffic patterns indicating DoS attempts
SIEM Query:
source="codesys" AND (event_type="crash" OR error="memory" OR component="CmpTraceMgr")